Qingqi Pei

Orcid: 0000-0001-7614-1422

According to our database1, Qingqi Pei authored at least 240 papers between 2006 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Reputation Management for Consensus Mechanism in Vehicular Edge Metaverse.
IEEE J. Sel. Areas Commun., April, 2024

Reliability-Security Tradeoff Analysis in mmWave Ad Hoc-based CPS.
ACM Trans. Sens. Networks, March, 2024

NOMA-Assisted Secure Offloading for Vehicular Edge Computing Networks With Asynchronous Deep Reinforcement Learning.
IEEE Trans. Intell. Transp. Syst., March, 2024

When Evolutionary Computation Meets Privacy.
IEEE Comput. Intell. Mag., February, 2024

Physical Layer Security in Full-Duplex Millimeter Wave Communication Systems.
IEEE Trans. Veh. Technol., 2024

Eyes See Hazy while Algorithms Recognize Who You Are.
ACM Trans. Priv. Secur., 2024

A Survey on Long Video Generation: Challenges, Methods, and Prospects.
CoRR, 2024

2023
Joint Optimization of Security Strength and Resource Allocation for Computation Offloading in Vehicular Edge Computing.
IEEE Trans. Wirel. Commun., December, 2023

Asynchronous Deep Reinforcement Learning for Collaborative Task Computing and On-Demand Resource Allocation in Vehicular Edge Computing.
IEEE Trans. Intell. Transp. Syst., December, 2023

A Privacy-Preserving Ride-Matching Scheme Without a Trusted Third-Party Server.
IEEE Syst. J., December, 2023

VeriDKG: A Verifiable SPARQL Query Engine for Decentralized Knowledge Graphs.
Proc. VLDB Endow., December, 2023

QoE Fairness Resource Allocation in Digital Twin-Enabled Wireless Virtual Reality Systems.
IEEE J. Sel. Areas Commun., November, 2023

An enhanced method for dialect transcription via error-correcting thesaurus.
IET Commun., October, 2023

Resource Optimization of MAB-Based Reputation Management for Data Trading in Vehicular Edge Computing.
IEEE Trans. Wirel. Commun., August, 2023

MSTDB: A Hybrid Storage-Empowered Scalable Semantic Blockchain Database.
IEEE Trans. Knowl. Data Eng., August, 2023

Random Beam Switching: A Physical Layer Key Generation Approach to Safeguard mmWave Electronic Devices.
IEEE Trans. Consumer Electron., August, 2023

Monocular 3D object detection with Pseudo-LiDAR confidence sampling and hierarchical geometric feature extraction in 6G network.
Digit. Commun. Networks, August, 2023

Multilevel Federated Learning-Based Intelligent Traffic Flow Forecasting for Transportation Network Management.
IEEE Trans. Netw. Serv. Manag., June, 2023

An Information-Centric In-Network Caching Scheme for 5G-Enabled Internet of Connected Vehicles.
IEEE Trans. Mob. Comput., June, 2023

Joint Secure Offloading and Resource Allocation for Vehicular Edge Computing Network: A Multi-Agent Deep Reinforcement Learning Approach.
IEEE Trans. Intell. Transp. Syst., May, 2023

A Cooperative Vehicle-Infrastructure System for Road Hazards Detection With Edge Intelligence.
IEEE Trans. Intell. Transp. Syst., May, 2023

Deep Reinforcement Learning Based Joint Beam Allocation and Relay Selection in mmWave Vehicular Networks.
IEEE Trans. Commun., April, 2023

A robust reversible watermarking scheme overcomes the misalignment problem of generalized histogram shifting.
Multim. Tools Appl., February, 2023

Lightweight Federated Learning for Large-Scale IoT Devices With Privacy Guarantee.
IEEE Internet Things J., February, 2023

CrowdFA: A Privacy-Preserving Mobile Crowdsensing Paradigm via Federated Analytics.
IEEE Trans. Inf. Forensics Secur., 2023

Cure-GNN: A Robust Curvature-Enhanced Graph Neural Network Against Adversarial Attacks.
IEEE Trans. Dependable Secur. Comput., 2023

Learning in Your "Pocket": Secure Collaborative Deep Learning With Membership Privacy.
IEEE Trans. Dependable Secur. Comput., 2023

SmartDID: A Novel Privacy-Preserving Identity Based on Blockchain for IoT.
IEEE Internet Things J., 2023

Defed: An Edge-Feature-Enhanced Image Denoised Network Against Adversarial Attacks for Secure Internet of Things.
IEEE Internet Things J., 2023

SOCI^+: An Enhanced Toolkit for Secure OutsourcedComputation on Integers.
CoRR, 2023

Blockage-Based Cooperative Jamming for Secure Terahertz Transmissions in Indoor Networks.
Proceedings of the 98th IEEE Vehicular Technology Conference, 2023

Defense Against Adversarial Attacks via Adversarial Noise Denoising Networks in Image Recognition.
Proceedings of the International Conference on Networking and Network Applications, 2023

Trustworthy and Load-Balancing Routing Scheme for Satellite Services with Multi-Agent DRL.
Proceedings of the IEEE INFOCOM 2023, 2023

Secure mmWave Vehicular Communications with DRL-Based Joint Relay and Jammer Selection.
Proceedings of the IEEE International Conference on Communications, 2023

Energy Efficient Secure Offloading in NOMA-aided Vehicular Networks Using A3C Learning.
Proceedings of the IEEE International Conference on Communications, 2023

A Cross-Chain System Supports Verifiable Complete Data Provenance Queries.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2023

Accessible Distributed Hydrological Surveillance and Computing System with Integrated End-Edge-Cloud Architecture.
Proceedings of the IEEE Global Communications Conference, 2023

Secure Terahertz Indoor Communications Using Blockage Feature-Based Artificial Noise in 6G.
Proceedings of the IEEE Global Communications Conference, 2023

A Reinforcement Learning-based DAG Tasks Scheduling in Edge-Cloud Collaboration Systems.
Proceedings of the IEEE Global Communications Conference, 2023

Efficient Sample Alignment with Fast Polynomial Interpolation for Vertical Federated Learning.
Proceedings of the IEEE Global Communications Conference, 2023

SSL-ABD : An Adversarial Defense Method Against Backdoor Attacks in Self-supervised Learning.
Proceedings of the Artificial Intelligence Security and Privacy, 2023

2022
An Integrated Method for River Water Level Recognition from Surveillance Images Using Convolution Neural Networks.
Remote. Sens., December, 2022

Min-Max Cost Optimization for Efficient Hierarchical Federated Learning in Wireless Edge Networks.
IEEE Trans. Parallel Distributed Syst., 2022

Data Dissemination for Industry 4.0 Applications in Internet of Vehicles Based on Short-term Traffic Prediction.
ACM Trans. Internet Techn., 2022

Vehicle Selection and Resource Optimization for Federated Learning in Vehicular Edge Computing.
IEEE Trans. Intell. Transp. Syst., 2022

Consortium Blockchain-Based Computation Offloading Using Mobile Edge Platoon Cloud in Internet of Vehicles.
IEEE Trans. Intell. Transp. Syst., 2022

Popularity Incentive Caching for Vehicular Named Data Networking.
IEEE Trans. Intell. Transp. Syst., 2022

FEEL: Federated End-to-End Learning With Non-IID Data for Vehicular Ad Hoc Networks.
IEEE Trans. Intell. Transp. Syst., 2022

Routing With Traffic Awareness and Link Preference in Internet of Vehicles.
IEEE Trans. Intell. Transp. Syst., 2022

A Federated Learning Based Privacy-Preserving Smart Healthcare System.
IEEE Trans. Ind. Informatics, 2022

PrivFace: Fast Privacy-Preserving Face Authentication With Revocable and Reusable Biometric Credentials.
IEEE Trans. Dependable Secur. Comput., 2022

Heterogeneous Computation and Resource Allocation for Wireless Powered Federated Edge Learning Systems.
IEEE Trans. Commun., 2022

Distributed Online Optimization of Edge Computing With Mixed Power Supply of Renewable Energy and Smart Grid.
IEEE Trans. Commun., 2022

Multi-Controller Deployment in SDN-Enabled 6G Space-Air-Ground Integrated Network.
Remote. Sens., 2022

Authentication Security Level and Resource Optimization of Computation Offloading in Edge Computing Systems.
IEEE Internet Things J., 2022

Resisting Malicious Eavesdropping: Physical Layer Security of mmWave MIMO Communications in Presence of Random Blockage.
IEEE Internet Things J., 2022

EMK-ABSE: Efficient Multikeyword Attribute-Based Searchable Encryption Scheme Through Cloud-Edge Coordination.
IEEE Internet Things J., 2022

Database Watermarking Algorithm Based on Decision Tree Shift Correction.
IEEE Internet Things J., 2022

Evolution as a Service: A Privacy-Preserving Genetic Algorithm for Combinatorial Optimization.
CoRR, 2022

DyWCP: Dynamic and Lightweight Data-Channel Coupling towards Confidentiality in IoT Security.
Proceedings of the WiSec '22: 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks, San Antonio, TX, USA, May 16, 2022

Safeguarding MmWave Systems Using Full-Duplex Jamming Receiver.
Proceedings of the 95th IEEE Vehicular Technology Conference, 2022

FSVM: Federated Support Vector Machines for Smart City.
Proceedings of the Tools for Design, Implementation and Verification of Emerging Information Technologies, 2022

Joint design of beamforming and trajectory for integrated sensing and communication drone networks.
Proceedings of the 5th International ACM Mobicom Workshop on Drone Assisted Wireless Communications for 5G and Beyond, 2022

DRL-based Beam Allocation in Relay-aided Multi-user MmWave Vehicular Networks.
Proceedings of the IEEE INFOCOM 2022, 2022

Learning Based and Physical-layer Assisted Secure Computation Offloading in Vehicular Spectrum Sharing Networks.
Proceedings of the IEEE INFOCOM 2022, 2022

Poster: A Dynamic Task Scheduling using Multi-Platoon Architecture in Vehicular Networks.
Proceedings of the 42nd IEEE International Conference on Distributed Computing Systems, 2022

Two-Phase Deep Reinforcement Learning of Dynamic Resource Allocation and Client Selection for Hierarchical Federated Learning.
Proceedings of the IEEE/CIC International Conference on Communications in China, 2022

Secure mmWave C-V2X Communications Using Cooperative Jamming.
Proceedings of the IEEE Global Communications Conference, 2022

2021
Data-Driven Caching With Users' Content Preference Privacy in Information-Centric Networks.
IEEE Trans. Wirel. Commun., 2021

Fair-Hierarchical Scheduling for Diversified Services in Space, Air and Ground for 6G-Dense Internet of Things.
IEEE Trans. Netw. Sci. Eng., 2021

Traffic Flow Prediction Based on Deep Learning in Internet of Vehicles.
IEEE Trans. Intell. Transp. Syst., 2021

An Edge Traffic Flow Detection Scheme Based on Deep Learning in an Intelligent Transportation System.
IEEE Trans. Intell. Transp. Syst., 2021

Remote Sensing Data Augmentation Through Adversarial Training.
IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., 2021

Flood Discharge Prediction Based on Remote-Sensed Spatiotemporal Features Fusion and Graph Attention.
Remote. Sens., 2021

Location privacy-preserving in online taxi-hailing services.
Peer-to-Peer Netw. Appl., 2021

Modulation of the dynamics of cerebellar Purkinje cells through the interaction of excitatory and inhibitory feedforward pathways.
PLoS Comput. Biol., 2021

Vehicular Edge Computing and Networking: A Survey.
Mob. Networks Appl., 2021

MutualRec: Joint friend and item recommendations with mutualistic attentional graph neural networks.
J. Netw. Comput. Appl., 2021

Federated Data Cleaning: Collaborative and Privacy-Preserving Data Cleaning for Edge Intelligence.
IEEE Internet Things J., 2021

Blockchain-Enabled Secure Data Sharing Scheme in Mobile-Edge Computing: An Asynchronous Advantage Actor-Critic Learning Approach.
IEEE Internet Things J., 2021

Service Characteristics-Oriented Joint Optimization of Radio and Computing Resource Allocation in Mobile-Edge Computing.
IEEE Internet Things J., 2021

UAV-Assisted Vehicular Edge Computing for the 6G Internet of Vehicles: Architecture, Intelligence, and Challenges.
IEEE Commun. Stand. Mag., 2021

Convolutional Neural Networks for forecasting flood process in Internet-of-Things enabled smart city.
Comput. Networks, 2021

Distributed computation offloading method based on deep reinforcement learning in ICV.
Appl. Soft Comput., 2021

Secrecy Outage Analysis of Artificial-Noise-Aided mmWave Transmissions in the Presence of Blockage.
Proceedings of the 93rd IEEE Vehicular Technology Conference, 2021

A Nested Incentive Scheme for Distributed File Sharing Systems.
Proceedings of the IEEE International Conference on Smart Internet of Things, 2021

Task Scheduling and Resource Management in MEC-Enabled Computing Networks.
Proceedings of the Mobile Networks and Management - 11th EAI International Conference, 2021

LPDBN: A Privacy Preserving Scheme for Deep Belief Network.
Proceedings of the 2021 IEEE Conference on Computer Communications Workshops, 2021

Privacy-Preserving Neural Network Inference Framework via Homomorphic Encryption and SGX.
Proceedings of the 41st IEEE International Conference on Distributed Computing Systems, 2021

Joint Computation Resource Allocation Using Mobile-Edge-Platooning-Cloud in the Internet of Vehicles.
Proceedings of the ICC 2021, 2021

2020
Joint Optimization of Radio and Computational Resources Allocation in Blockchain-Enabled Mobile Edge Computing Systems.
IEEE Trans. Wirel. Commun., 2020

Dynamic Network Slicing and Resource Allocation in Mobile Edge Computing Systems.
IEEE Trans. Veh. Technol., 2020

Smart-Contract-Based Economical Platooning in Blockchain-Enabled Urban Internet of Vehicles.
IEEE Trans. Ind. Informatics, 2020

A Secure Content Sharing Scheme Based on Blockchain in Vehicular Named Data Networks.
IEEE Trans. Ind. Informatics, 2020

Clock Auction Inspired Privacy Preserving Emergency Demand Response in Colocation Data Centers.
IEEE Trans. Dependable Secur. Comput., 2020

Independent Embedding Domain Based Two-Stage Robust Reversible Watermarking.
IEEE Trans. Circuits Syst. Video Technol., 2020

Artificial Noise Hopping: A Practical Secure Transmission Technique With Experimental Analysis for Millimeter Wave Systems.
IEEE Syst. J., 2020

A Hybrid Cyber Defense Mechanism to Mitigate the Persistent Scan and Foothold Attack.
Secur. Commun. Networks, 2020

Efficient distributed privacy-preserving collaborative outlier detection.
Peer-to-Peer Netw. Appl., 2020

An enhanced probabilistic fairness-aware group recommendation by incorporating social activeness.
J. Netw. Comput. Appl., 2020

Personalized Federated Learning With Differential Privacy.
IEEE Internet Things J., 2020

Regional-Centralized Content Dissemination for eV2X Services in 5G mmWave-Enabled IoV.
IEEE Internet Things J., 2020

Cooperative Computation Offloading and Resource Allocation for Blockchain-Enabled Mobile-Edge Computing: A Deep Reinforcement Learning Approach.
IEEE Internet Things J., 2020

Intrinsic and Synaptic Properties Shaping Diverse Behaviors of Neural Dynamics.
Frontiers Comput. Neurosci., 2020

MGNN: Mutualistic Graph Neural Network for Joint Friend and Item Recommendation.
IEEE Intell. Syst., 2020

RecRisk: An enhanced recommendation model with multi-facet risk control.
Expert Syst. Appl., 2020

An Intelligent Deployment Policy for Deception Resources Based on Reinforcement Learning.
IEEE Access, 2020

A Cache Allocation Scheme in 5G-Enabled Inhomogeneous ICVs.
Proceedings of the 92nd IEEE Vehicular Technology Conference, 2020

An Efficient Query Scheme for Hybrid Storage Blockchains Based on Merkle Semantic Trie.
Proceedings of the International Symposium on Reliable Distributed Systems, 2020

Privacy-preserving Data Aggregation for Big Data in Financial Institutions.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

Sparser: Secure Nearest Neighbor Search with Space-filling Curves.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

A Solution to Data Accessibility Across Heterogeneous Blockchains.
Proceedings of the 26th IEEE International Conference on Parallel and Distributed Systems, 2020

Image Content Location Privacy Preserving in Social Network Travel Image Sharing.
Proceedings of the Artificial Intelligence and Security - 6th International Conference, 2020

Distributed Computation Offloading using Deep Reinforcement Learning in Internet of Vehicles.
Proceedings of the 9th IEEE/CIC International Conference on Communications in China, 2020

Federated CF: Privacy-Preserving Collaborative Filtering Cross Multiple Datasets.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

IDDS: An ICN based Data Dissemination Scheme for Vehicular Networks.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

Privacy-Preserving Personalized Federated Learning.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

Privacy Preserving Facial Recognition Against Model Inversion Attacks.
Proceedings of the IEEE Global Communications Conference, 2020

Deep Reinforcement Learning for Blockchain-Enabled Mobile Edge Computing Systems.
Proceedings of the IEEE Globecom Workshops, 2020

2019
Computation Offloading and Resource Allocation for Wireless Powered Mobile Edge Computing With Latency Constraint.
IEEE Wirel. Commun. Lett., 2019

GAS: A group acknowledgment strategy for popular content distribution in Internet of vehicle.
Veh. Commun., 2019

Physical Layer Security in Millimeter Wave DF Relay Systems.
IEEE Trans. Wirel. Commun., 2019

Detecting Vehicle Anomaly in the Edge via Sensor Consistency and Frequency Characteristic.
IEEE Trans. Veh. Technol., 2019

Privacy-Preserving Reputation Management for Edge Computing Enhanced Mobile Crowdsensing.
IEEE Trans. Serv. Comput., 2019

Three-dimensional Prediction-Error Histograms Based Reversible Data Hiding Algorithm for Color Images.
Multim. Tools Appl., 2019

Reversible data hiding using the dynamic block-partition strategy and pixel-value-ordering.
Multim. Tools Appl., 2019

A reliable reputation computation framework for online items in E-commerce.
J. Netw. Comput. Appl., 2019

Coding Capacity of Purkinje Cells With Different Schemes of Morphological Reduction.
Frontiers Comput. Neurosci., 2019

Anomalies Detection and Proactive Defence of Routers Based on Multiple Information Learning.
Entropy, 2019

Privacy-Preserving Compressive Model for Enhanced Deep-Learning-Based Service Provision System in Edge Computing.
IEEE Access, 2019

A Robust Deep-Neural-Network-Based Compressed Model for Mobile Device Assisted by Edge Server.
IEEE Access, 2019

A Privacy-Preserving Edge Computation-Based Face Verification System for User Authentication.
IEEE Access, 2019

An Efficient and Reliable QoF Routing for Urban VANETs With Backbone Nodes.
IEEE Access, 2019

Speed Adjustment Attack on Cooperative Sensing in Cognitive Vehicular Networks.
IEEE Access, 2019

PTCCR: A Path Transmission Costs-Based Multi-Lane Connectivity Routing Protocol for Urban Internet of Vehicles.
IEEE Access, 2019

CRML: A Convolution Regression Model With Machine Learning for Hydrology Forecasting.
IEEE Access, 2019

DAPV: Diagnosing Anomalies in MANETs Routing With Provenance and Verification.
IEEE Access, 2019

Decentralized Privacy-Preserving Reputation Management for Mobile Crowdsensing.
Proceedings of the Security and Privacy in Communication Networks, 2019

Race Classification Based Iris Image Segmentation.
Proceedings of the Smart Multimedia - Second International Conference, 2019

Privacy-Preserving Verification and Root-Cause Tracing Towards UAV Social Networks.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

DAPS: A Decentralized Anonymous Payment Scheme with Supervision.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2019

Elastic and Inelastic Content Distribution Based on Clonal Selection in VANETs.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

AClog: Attack Chain Construction Based on Log Correlation.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

Efficient Privacy Preserving Cross-Datasets Collaborative Outlier Detection.
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019

2018
Spoofing attacks and countermeasures in fm indoor localization system.
World Wide Web, 2018

Robust Reputation-Based Cooperative Spectrum Sensing via Imperfect Common Control Channel.
IEEE Trans. Veh. Technol., 2018

Location Privacy Violation via GPS-Agnostic Smart Phone Car Tracking.
IEEE Trans. Veh. Technol., 2018

Corrections to "Secret Key Establishment via RSS Trajectory Matching Between Wearable Devices" [Mar 18 802-817].
IEEE Trans. Inf. Forensics Secur., 2018

Secret Key Establishment via RSS Trajectory Matching Between Wearable Devices.
IEEE Trans. Inf. Forensics Secur., 2018

Signal Entanglement Based Pinpoint Waveforming for Location-Restricted Service Access Control.
IEEE Trans. Dependable Secur. Comput., 2018

Reversible watermarking based on multi-dimensional prediction-error expansion.
Multim. Tools Appl., 2018

AutoPrivacy: Automatic privacy protection and tagging suggestion for mobile social photo.
Comput. Secur., 2018

A Novel Trust Evaluation Mechanism for Collaborative Filtering Recommender Systems.
IEEE Access, 2018

A Slot Assignment Scheme based on Moving Directions of Vehicles in the Internet of Vehicles.
Proceedings of the 21st International Symposium on Wireless Personal Multimedia Communications, 2018

Anomalies Detection of Routers Based on Multiple Information Learning.
Proceedings of the International Conference on Networking and Network Applications, 2018

Adaptive Robust Reversible Watermarking Scheme.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

TrustCF: A Hybrid Collaborative Filtering Recommendation Model with Trust Information.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

A Practical Privacy-Preserving Face Authentication Scheme with Revocability and Reusability.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

Data-Driven Caching with Users' Local Differential Privacy in Information-Centric Networks.
Proceedings of the IEEE Global Communications Conference, 2018

Log-based Anomalies Detection of MANETs Routing with Reasoning and Verification.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2018

2017
Dynamic Combined with Static Analysis for Mining Network Protocol's Hidden Behavior.
Int. J. Bus. Data Commun. Netw., 2017

Probability-based prediction query algorithm.
Ad Hoc Networks, 2017

Probability-Based Location Prediction Algorithm.
Proceedings of the 86th IEEE Vehicular Technology Conference, 2017

A Novel Recommendation Model Based on Trust Relations and Item Ratings in Social Networks.
Proceedings of the International Conference on Networking and Network Applications, 2017

A Security Routing Protocol for Internet of Things Based on RPL.
Proceedings of the International Conference on Networking and Network Applications, 2017

One-tag checker: Message-locked integrity auditing on encrypted cloud deduplication storage.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

2016
A GTS Allocation Scheme to Improve Multiple-Access Performance in Vehicular Sensor Networks.
IEEE Trans. Veh. Technol., 2016

A Safety Enhancement Broadcasting Scheme Based on Context Sensing in VANETs.
Mob. Inf. Syst., 2016

Cognitive Networking for Next-G Wireless Communications.
Int. J. Distributed Sens. Networks, 2016

Location Privacy-Preserving Channel Allocation Scheme in Cognitive Radio Networks.
Int. J. Distributed Sens. Networks, 2016

Spoofing Attacks against FM Indoor Localization.
Proceedings of the International Conference on Networking and Network Applications, 2016

QuickAuth: Two-Factor Quick Authentication Based on Ambient Sound.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

A Novel Power-Saving Scheduling Scheme in Large Scale Smart-Grid Networks.
Proceedings of the Communications and Networking, 2016

2015
Instruction Clustering Analysis for Unknown Network Protocol's Abnormal Behavior.
J. Interconnect. Networks, 2015

A novel reversible image data hiding scheme based on pixel value ordering and dynamic pixel block partition.
Inf. Sci., 2015

A Strong and Weak Ties Feedback-Based Trust Model in Multimedia Social Networks.
Comput. J., 2015

Agent-based Channel Selection scheme against location inference attack in cognitive radio networks.
Proceedings of the 34th IEEE Military Communications Conference, 2015

A fuzzy logic controlled mobility model based on simulated traffics' characteristics in MANET.
Proceedings of the 2015 International Conference on High Performance Computing & Simulation, 2015

Reputation-based coalitional games for spectrum allocation in distributed Cognitive Radio networks.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Location-restricted Services Access Control Leveraging Pinpoint Waveforming.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

Instruction Clustering Analysis for Network Protocol's Abnormal Behavior.
Proceedings of the 10th International Conference on P2P, 2015

Analyze Network Protocol's Hidden Behavior.
Proceedings of the 10th International Conference on P2P, 2015

2014
A Lossless Tagged Visual Cryptography Scheme.
IEEE Signal Process. Lett., 2014

A Secure Dynamic Identity based Single Sign-On Authentication Protocol.
J. Softw., 2014

The QoS-Ensured Vertical Handoff Decision in Heterogeneous Wireless Networks.
J. Inf. Sci. Eng., 2014

A connectivity-aware intersection-based routing in VANETs.
EURASIP J. Wirel. Commun. Netw., 2014

Avoiding Information Congestion in VANETs: A Congestion Game Approach.
Proceedings of the 14th IEEE International Conference on Computer and Information Technology, 2014

2013
Adaptive reversible watermarking with improved embedding capacity.
J. Syst. Softw., 2013

Improvement on Meshram et al.'s ID-based cryptographic mechanism.
Inf. Process. Lett., 2013

A sensing and etiquette reputation-based trust management for centralized cognitive radio networks.
Neurocomputing, 2013

A Trust Value-Based Spectrum Allocation Algorithm in CWSNs.
Int. J. Distributed Sens. Networks, 2013

A Proximity-Based Concurrent Access Strategy to Improve Throughput in VANETs.
Int. J. Distributed Sens. Networks, 2013

Connectivity Analysis for Free-Flow Traffic in VANETs: A Statistical Approach.
Int. J. Distributed Sens. Networks, 2013

Secure and efficient mutual authentication protocol for RFID conforming to the EPC C-1 G-2 standard.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013

Dynamic Trust Threshold Value Based on Market Theory in Cognitive Radio Networks.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

A Dynamic Intrusion Detection Mechanism Based on Smart Agents in Distributed Cognitive Radio Networks.
Proceedings of the Genetic and Evolutionary Computing, 2013

A Path-Combination Based Routing Scheme for Cognitive Radio Networks.
Proceedings of the Genetic and Evolutionary Computing, 2013

2012
The multimedia service session handoff method in heterogeneous wireless networks.
Int. J. Grid Util. Comput., 2012

Improving Driving Safety Based on Safe Distance Design in Vehicular Sensor Networks.
Int. J. Distributed Sens. Networks, 2012

Improved multicast key management of Chinese wireless local area network security standard.
IET Commun., 2012

A Simple but Effective Congestion Control Scheme for Safety-Related Events in VANET.
IEICE Trans. Inf. Syst., 2012

Concurrent Transmission Based on Channel Quality in Ad Hoc Networks: A Game Theoretic Approach.
IEICE Trans. Inf. Syst., 2012

Adaptive Trust Management Mechanism for Cognitive Radio Networks.
Proceedings of the 11th IEEE International Conference on Trust, 2012

The Wireless Vertical Handoff Decision Algorithm with Parameter Prediction.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

Security Information Flow Control Model and Method in MILS.
Proceedings of the Eighth International Conference on Computational Intelligence and Security, 2012

Anti-jamming Scheme Based on Zero Pre-shared Secret in Cognitive Radio Network.
Proceedings of the Eighth International Conference on Computational Intelligence and Security, 2012

A Multi-server Architecture Authentication Protocol Using Smart Card.
Proceedings of the Eighth International Conference on Computational Intelligence and Security, 2012

2011
Game-Theoretic Analyses and Simulations of Adoptions of Security Policies for Drm in Contents Sharing Scenario.
Intell. Autom. Soft Comput., 2011

MS2HM: A Multimedia Service Session Handoff Method between Heterogeneous Wireless Networks.
Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30, 2011

HGRP: Hybrid Grid Routing Protocol for Heterogeneous Hierarchical Wireless Networks.
Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30, 2011

A General Sharing Model Based on Proxy Re-encryption.
Proceedings of the Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2011

A Trust Management Model in Centralized Cognitive Radio Networks.
Proceedings of the 2011 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2011

Distributed Storage Schemes for Controlling Data Availability in Wireless Sensor Networks.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011

A Trust-based Dynamic Secure Service Discovery Model for Pervasive Computing.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011

A security testing approach for WSN protocols based on object-oriented attack model.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011

An Automated Black-box Testing Approach for WSN Security Protocols.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011

2010
Key Infection, Secrecy Transfer, and Key Evolution for Sensor Networks.
IEEE Trans. Wirel. Commun., 2010

A novel data communication approach in wireless sensor networks.
Proceedings of the 2010 International Conference on High Performance Computing & Simulation, 2010

A Digital Rights Management scheme based on rational share content.
Proceedings of the 2010 International Conference on High Performance Computing & Simulation, 2010

Secure Communication Model of WSN Based on Secret Sharing.
Proceedings of the 2010 International Conference on Computational Intelligence and Security, 2010

A Sub-spectrum Sensing Scheme Based on Reputation in Cognitive Radio Networks.
Proceedings of the 2010 International Conference on Computational Intelligence and Security, 2010

Identity Authentication Based on Fuzzy Vault and Digital Certificate.
Proceedings of the 2010 International Conference on Computational Intelligence and Security, 2010

On Trust Degree-Based Usage Control in DRM System.
Proceedings of the 2010 International Conference on Computational Intelligence and Security, 2010

2009
Security and Trust in Digital Rights Management: A Survey.
Int. J. Netw. Secur., 2009

The Development Mode of Trust E-commerce Services.
Proceedings of the 2009 IEEE International Conference on e-Business Engineering, 2009

A Routing Algorithm Based on Ant-Colony in Wireless Sensor Networks.
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009

A New Hybrid Routing Protocol in Heterogeneous Wireless Networks.
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009

Anonymous Communication in Wireless Mesh Network.
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009

Cooperative and Non-Cooperative Game-Theoretic Analyses of Adoptions of Security Policies for DRM.
Proceedings of the 6th IEEE Consumer Communications and Networking Conference, 2009

An Active Defense Model and Framework of Insider Threats Detection and Sense.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

A Deep Copy Protection Framework for Electronic Devices within Home.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

Layer Key Management Scheme on Wireless Sensor Networks.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

Distributed Event-Triggered Trust Management for Wireless Sensor Networks.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

An Effective Scheme for Defending Denial-of-Sleep Attack in Wireless Sensor Networks.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

2008
A Congestion Avoidance and Performance Enhancement Scheme for Mobile Ad Hoc Networks.
Proceedings of the MSN 2008, 2008

A Fine-Grained Digital Rights Transfer Policy and Trusted Distribution and Enforcement.
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008

ECC-Based Threshold Digital Signature Scheme without a Trusted Party.
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008

2007
A Novel Digital Content Protection System Based on Iris Biometric.
Proceedings of the Fourth International Conference on Fuzzy Systems and Knowledge Discovery, 2007

Research on the Resilience of Key Management in Sensor Networks.
Proceedings of the Computational Intelligence and Security, International Conference, 2007

2006
An Intelligent Digital Content Protection Framework Between Home Network Receiver Devices.
Proceedings of the Computational Intelligence and Security, International Conference, 2006


  Loading...